Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Turn-Based War Chess Model and Its Search Algorithm per Turn., , , , , and . Int. J. Comput. Games Technol., (2016)Multi-modal Medical Data Exploration Based on Data Lake., , , , , , and . HIS, volume 14305 of Lecture Notes in Computer Science, page 213-222. Springer, (2023)Weak Ordering Space Search in Turn-based War Chess Gaming., , , and . SPAC, page 141-145. IEEE, (2018)Research on Multi-side Joint Industrial Parts Inspection Based on Model Fusion., , , , , , and . Appl. Artif. Intell., (2022)Ontology knowledge base combined with Bayesian networks for integrated corridor risk warning., , and . Comput. Commun., (2021)Dynamic coupling risk assessment model of utility tunnels based on multimethod fusion., , , and . Reliab. Eng. Syst. Saf., (2022)GLS coding based security solution to JPEG with the structure of aggregated compression and encryption., , , and . Commun. Nonlinear Sci. Numer. Simul., 19 (5): 1366-1374 (2014)Reversible data hiding in encrypted images using cross division and additive homomorphism., , , and . Signal Process. Image Commun., (2015)Achieving Light-Weighted Secure Scheme for Communication in a Smart Grid., , and . IEEE Access, (2023)Target spectrum-based risk analysis model for utility tunnel O&M in multiple scenarios and its application., , and . Reliab. Eng. Syst. Saf., (February 2024)